To continue with the series of Zenarmor SIEM integration guides that I have created over the last few months, today we are going to look at how we can integrate Zenarmor with Datadog. Datadog is slightly different from the previous SIEMs we have covered because it’s the only one that is a SaaS-only solution, meaning…
Category: Blue Team/Defensive
How to integrate Zenarmor with Splunk Enterprise using Splunk Connect for Syslog (SC4S)
Splunk is a popular unified security and observability platform used by businesses and MSSPs to detect, investigate, and respond to potential security threats. Today, many enterprises use it as their preferred Security Information and Event Management (SIEM) solution. In this guide, I am going to show you how Splunk Enterprise and Zenarmor can easily be integrated, giving…
Integrating Zenarmor with your ELK stack (Elasticsearch, Logstash, and Kibana)
The ELK stack (Elasticsearch, Logstash, and Kibana), also known as the Elastic stack is a popular platform used by organizations to collect, search, analyze, and visualize data from any sources and in the context of cybersecurity can be used as a Security Information and Event Management (SIEM) solution with the correct integrations. Based on its popularity and…
Introducing Zenarmor® 1.14: OPNsense interface improvements through Zenconsole integration
Zenarmor® 1.14 has just arrived offering some modern visual and functional GUI improvements made to the built-in OPNsense dashboard. If you are familiar with the Zenconsole cloud-based dashboard that we have extensively showcased in some of my previous articles, you will feel right at home with the dashboard changes made to OPNsense. At first glance,…
Integrating Zenarmor with Wazuh – A guide to SIEM integration using Syslog.
In the world of cybersecurity, having a robust and efficient Security Information and Event Management (SIEM) system is crucial. SIEM systems provide real-time analysis of security alerts generated by applications and network hardware. In this guide, we will explore how to integrate Zenarmor, a powerful network security solution, with Wazuh, a free and open-source SIEM…
How to Integrate Wazuh & TheHive – Virtual Lab Building Series Ep: 13
Welcome to my channel! In Episode 13 we will continue building our lab Security Operations Center (SOC) and I am going to show you how to integrate Wazuh, our open-source SIEM platform, with The Hive, our security incident response platform (SIRP) so that we can feed alerts into The Hive allowing analysts to easily, filter…
How MSPs can leverage Active Directory services with Zenarmor®
Microsoft Active Directory, in all its variations, can be considered one of the most widely-used identity and access management services by businesses today. It is a critical foundational component for companies adopting Microsoft services and solutions both on-prem and in the cloud. In this article we are going to explore how managed service providers (MSPs)…
How to deploy Zenarmor® in Layer2 bridge mode on Ubuntu server 22.04
In a previous blog article, we explored the concept of using Zenarmor® as a cloud-deployed secure web gateway (SWG) as part of a Secure Access Service Edge (SASE) architecture, where Zenarmor® was set up inline to filter egress internet traffic. Today, we are going to take a deeper look at the Layer 2 bridge deployment mode available…
Introducing Zenarmor® 1.13: An MSP and Enterprise decision-makers Guide to how these new and improved capabilities can enhance overall cyber security
The greatly anticipated release of Zenarmor® 1.13 has just arrived and offers important new and improved capabilities that both technical and business decision-makers will find helpful when implementing security solutions to strengthen their overall enterprise cyber security posture. A brief overview of the updates included in this release are: So when you are ready, let’s…
How VirtualBox 7.0 networking works – NAT, NAT Network, Internal Network, Bridged Adapter
In this tutorial, we are going to look at VirtualBox networking modes where I will explain how NAT, NAT Network, Internal Network, and Bridge Adapter network modes work as well as provide examples for each use case. I created this video to supplement my cyber security virtual lab building series because I saw many people…